Skip to main content

Classic network security, also known as enterprise security, is an indispensable basis for any security concept. ensec has penetrated the subject in depth – and therefore also knows which other components you need for a sustainable information security concept.

Network security: the cornerstone of your security concept

300 person-years: that’s – to give you a rough idea – the wealth of experience that the experts at ensec have accumulated in the field of network security. The topic is one of our core competences, especially in the banking, insurance and public sector environment. Our senior engineers each have more than ten years of experience with (next generation) firewalls, intrusion detection and intrusion prevention systems, VPN gateways, load balancers and much more.

However, our customers not only benefit from our extensive expertise. They also benefit from the short lines of communication within the company: If challenges arise in the course of a customer project that require specialised detailed knowledge, the project managers can easily call on colleagues from ensec who have the appropriate knowledge and experience. Even if they were not originally part of the project team. Our network security specialists only install next-generation firewalls at our customers’ premises – there are no insurmountable walls within ensec. Thanks to the close collaboration, our network security engineers are always up to date on which other solutions customers need to add to the network security products for a comprehensive information security concept. For example, endpoint or content security components.

Technology is indispensable – but not the only key to success

Speaking of next-generation firewalls: you can rest assured that we know all the products we use inside out. We spend a lot of time selecting our partners, suppliers and the hardware and software they offer. Thanks to our “boutique instead of vendor’s tray” philosophy, we know the strengths and weaknesses of the products in detail and can therefore present you with the solution that best meets the individual requirements of your organisation.

Your protection needs usually determine these requirements. If you need support in determining these requirements or would like to have your existing protection requirements analysis checked for validity, we can provide you with our GRC (Governance, Risk, Compliance) specialists at any time.

Through our work for larger companies and authorities, we also know that technology is not the only challenge. Rather, it is important to identify and listen to all stakeholders in order to then harmonise their requirements and needs. Here, too, you benefit from our experience: our specialists have acquired both foresight and prudence as well as technical expertise.

Intrusion Prevention ensec style

Intrusion prevention systems (IPS) are an excellent example of why ensec is the right partner for your organisation. IPS as an example: Modern IPS solutions come with every conceivable mechanism for preventing network communication. If you activate the full scope or the wrong options, you will jeopardise the productivity of your employees.

Sensible parameterisation of the software requires that the experts entrusted with this task are familiar with the respective infrastructure and the organisation’s working methods. Ensec gains the necessary insights – either by using an asset management solution or by studying the existing data. Or on the basis of the knowledge of the respective infrastructure that ensec employees have acquired over the course of many years of customer relations. This enables ensec to configure IPS optimised for the respective environment.

Optimisation also includes choosing the correct placement within the architecture. IPSs are typically located close to the perimeter. However, we can also use IPS to divide your network into different zones – depending on the level of protection required for the data being processed, for example – and install the solutions at the respective zone transitions. A risk analysis carried out by our GRC colleagues provides an answer to the question of whether this makes sense.

How you benefit from automated processes

Thanks to our detailed knowledge of the various interfaces of the products we use, we can help you integrate the products into automated processes. Your application managers also benefit from automation – using user-friendly tools provided by ensec, they can record the communication flows of their applications and then let the software create the appropriate firewall rules. Without the users having to know how many firewalls need to be configured or which protection zones exist.

Network Security im Detail

Secure SD-WAN

The cost-effective and efficient way to connect locations.

Automation

Gain an overview and control with automated network security policies.

Load Balancing

Maximum performance for your applications through intelligent management and forwarding of data traffic.

VPN

Secure Internet and data transmission across multiple networks and end devices with access controls.

Firewall

One of the most important components of network security. We have the latest generation of products.

IPS

Intrusion prevention systems continuously monitor the data traffic in the network. Suspicious data packets are blocked immediately and trigger an alert.

From a business perspective

SD-WAN: Cost savings and future security in one.

The leased lines and MPLS (Multiprotocol Label Switching) connections commonly used to connect external sites are reliable – but expensive. SD-WAN (Software Defined Wide Area Network) is the cheaper alternative.

Replacing the hub-and-spoke architectures that have grown out of MPLS with modern SD-WAN connections is one of the core issues for ensec: instead of routing all traffic to the headquarters via MPLS, we only route the data traffic that needs to go there to the headquarters via appropriately configured firewalls operated at the external sites. For example, because the ERP system runs in the company’s own data centre.

The remaining traffic goes to its destination via SD-WAN, for example to cloud services such as Microsoft 365. This reduces traffic costs and ensures the quality of service for voice or video conferences. Using the tool supplied by ensec for the centralised management of all connections, customers not only control data flows and security guidelines. They also lower operating costs by reducing the management effort.

May we personally provide you with arguments in favour of ensec? Please contact us.

Or give us a call:

+41 44 711 11 44